heroui logo

Potentially Suspicious Child Processes Spawned by ConHost

Sigma Rules

View Source
Summary
This detection rule targets potentially malicious activity involving child processes spawned by `conhost.exe`, a legitimate Windows utility that serves as a host for console applications. The rule is applicable in environments where process creation can provide insights into suspicious behavior, particularly when trusted system components like `conhost.exe` invoke child processes such as `cmd.exe`, `powershell.exe`, and others typically associated with scripts or command-line tasks. By monitoring the creation of child processes specifically tied to `conhost.exe`, the rule aims to identify scenarios indicative of malicious software employing evasion techniques by exploiting legitimate system processes, commonly utilized for executing further commands or scripts post-infection. Detecting these patterns can potentially reveal ongoing attack activities or post-exploitation scenarios.
Categories
  • Windows
  • Endpoint
Data Sources
  • Process
  • Logon Session
Created: 2025-02-05